Adel the whiteboard security guy 🛡️Email Spoofing In Cyber SecurityEmail spoofing can come in many forms, and in this video, we will uncover the most common tactics used by cybercriminals.Feb 12Feb 12
Adel the whiteboard security guy 🛡️Ransomware Attack Explained In Cyber SecurityThe first ever recorded ransomware attack dates back to 1989.Feb 4Feb 4
Adel the whiteboard security guy 🛡️Social Engineering In Cyber SecurityHere is a full video to watch if you don’t have time to read the full article:Jan 28Jan 28
Adel the whiteboard security guy 🛡️What Is Advanced Persistent ThreatIt is a very sneaky type of cyber threat.Jan 27Jan 27
Adel the whiteboard security guy 🛡️Drive By Download Attack In Cyber SecurityHere is a full video to watch if you don’t have time to read the full article:Jan 22Jan 22
Adel the whiteboard security guy 🛡️Smurf Attack ExplainedHere is a full video to watch if you don’t have time to read the full article:Jan 16Jan 16
Adel the whiteboard security guy 🛡️Trojan Horse Attack In Cyber SecurityThe Greek myth of the wooden horse 🐴 that was used to sneak into Troy is where the word “Trojan Horse” originates.Jan 13Jan 13
Adel the whiteboard security guy 🛡️TryHackMe | Security PrinciplesThis story contains the write up for the security principals room on the TryHackMe websites.Jan 13Jan 13
Adel the whiteboard security guy 🛡️TryHackMe | Security Engineer IntroThis story contains the write up for the Security Engineer Intro room on TryHackMe.Jan 11Jan 11
Adel the whiteboard security guy 🛡️Icmp Ping FloodHere is a full video to watch if you don’t have time to read the full article:Jan 11Jan 11